CA2383042A1 - Multiple module encryption method - Google Patents

Multiple module encryption method Download PDF

Info

Publication number
CA2383042A1
CA2383042A1 CA002383042A CA2383042A CA2383042A1 CA 2383042 A1 CA2383042 A1 CA 2383042A1 CA 002383042 A CA002383042 A CA 002383042A CA 2383042 A CA2383042 A CA 2383042A CA 2383042 A1 CA2383042 A1 CA 2383042A1
Authority
CA
Canada
Prior art keywords
module
encryption
decryption
key
modules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002383042A
Other languages
English (en)
French (fr)
Inventor
Marco Sasselli
Christophe Nicolas
Michael John Hill
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NagraCard SA
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2383042A1 publication Critical patent/CA2383042A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Slot Machines And Peripheral Devices (AREA)
  • Coupling Device And Connection With Printed Circuit (AREA)
CA002383042A 1999-08-30 2000-08-24 Multiple module encryption method Abandoned CA2383042A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
CH1573/99 1999-08-30
CH157399 1999-08-30
US19417100P 2000-04-03 2000-04-03
US60/194,171 2000-04-03
PCT/IB2000/001157 WO2001017159A1 (fr) 1999-08-30 2000-08-24 Methode d'encryptage multi-modules

Publications (1)

Publication Number Publication Date
CA2383042A1 true CA2383042A1 (en) 2001-03-08

Family

ID=25688037

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002383042A Abandoned CA2383042A1 (en) 1999-08-30 2000-08-24 Multiple module encryption method

Country Status (27)

Country Link
EP (1) EP1208666A1 (sk)
JP (1) JP2003508965A (sk)
KR (1) KR20020041807A (sk)
CN (1) CN100448193C (sk)
AP (1) AP2002002433A0 (sk)
AU (1) AU769437B2 (sk)
BG (1) BG64520B1 (sk)
BR (1) BR0013712A (sk)
CA (1) CA2383042A1 (sk)
CU (1) CU22950A3 (sk)
CZ (1) CZ2002582A3 (sk)
DZ (1) DZ3193A1 (sk)
EA (1) EA003745B1 (sk)
EE (1) EE200200106A (sk)
HK (1) HK1048407B (sk)
HR (1) HRP20020179A2 (sk)
HU (1) HU224846B1 (sk)
IL (1) IL148285A0 (sk)
MA (1) MA25431A1 (sk)
MX (1) MXPA02001849A (sk)
NO (1) NO20020951L (sk)
NZ (1) NZ517438A (sk)
OA (1) OA12153A (sk)
PL (1) PL353795A1 (sk)
SK (1) SK2892002A3 (sk)
TR (1) TR200200525T2 (sk)
WO (1) WO2001017159A1 (sk)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US10397258B2 (en) 2017-01-30 2019-08-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594797A (en) * 1995-02-22 1997-01-14 Nokia Mobile Phones Variable security level encryption
DE19539700C1 (de) * 1995-10-25 1996-11-28 Siemens Ag Sicherheitschip

Also Published As

Publication number Publication date
NO20020951D0 (no) 2002-02-27
BG64520B1 (bg) 2005-05-31
EP1208666A1 (fr) 2002-05-29
AU6311800A (en) 2001-03-26
TR200200525T2 (tr) 2002-07-22
MXPA02001849A (es) 2004-02-26
BR0013712A (pt) 2002-05-07
JP2003508965A (ja) 2003-03-04
CN100448193C (zh) 2008-12-31
HK1048407A1 (en) 2003-03-28
PL353795A1 (en) 2003-12-01
SK2892002A3 (en) 2002-07-02
AP2002002433A0 (en) 2002-03-31
IL148285A0 (en) 2002-09-12
HRP20020179A2 (en) 2004-02-29
WO2001017159A1 (fr) 2001-03-08
DZ3193A1 (fr) 2001-03-08
HU224846B1 (en) 2006-03-28
BG106436A (en) 2002-10-31
CU22950A3 (es) 2004-04-13
EA003745B1 (ru) 2003-08-28
MA25431A1 (fr) 2002-04-01
NZ517438A (en) 2003-09-26
AU769437B2 (en) 2004-01-29
HK1048407B (zh) 2009-09-25
HUP0202691A2 (en) 2002-12-28
CN1371563A (zh) 2002-09-25
CZ2002582A3 (cs) 2002-07-17
EE200200106A (et) 2003-04-15
EA200200184A1 (ru) 2002-06-27
NO20020951L (no) 2002-04-23
KR20020041807A (ko) 2002-06-03
OA12153A (fr) 2006-05-08

Similar Documents

Publication Publication Date Title
Young et al. Kleptography: Using cryptography against cryptography
EP1327932B1 (en) Encryption apparatus and method with side-channel attack resistance
US7248700B2 (en) Device and method for calculating a result of a modular exponentiation
EP1234404B1 (en) Generation of a mathematically constrained key using a one-way function
Mandal et al. Analysis of avalanche effect in plaintext of des using binary codes
KR20060081847A (ko) 비밀키를 보호하는 스마트 카드 및 그것의 방법
US7190790B1 (en) Multiple module encryption method
Li et al. Cryptanalysis of a data security protection scheme for VoIP
Singh et al. Comparative study of DES, 3DES, AES and RSA
KR100396740B1 (ko) 계산적 디피-헬만 가정에 기반하는 안전성 증명 가능한공개키 암호화 방법
AU769437B2 (en) Multiple module encryption method
Breier et al. A survey of the state-of-the-art fault attacks
Phan et al. On related-key and collision attacks: the case for the IBM 4758 cryptoprocessor
Khaleel et al. A novel stream cipher based on nondeterministic finite automata
Lone et al. Common attacks on RSA and its variants with possible countermeasures
Handschuh et al. On the security of double and 2-key triple modes of operation
KR20140065531A (ko) 중간키를 이용한 전력분석공격 방어방법
Piper Basic principles of cryptography
McEvoy et al. All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Rwabutaza et al. A comparative survey on cryptology-based methodologies
Van Der Merwe et al. TR-31 and AS 2805 (Non) equivalence report
Anjali Krishna et al. A Study on Cryptographic Techniques
Chalurkar et al. Survey on modular attack on RSA algorithm
Singh et al. Encryption algorithms with emphasis on probabilistic Encryption & time stamp in network security
Ahmed Timing filter for counter mode encryption

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued